AIセキュリティポータルbot

A Framework for Cost-Effective and Self-Adaptive LLM Shaking and Recovery Mechanism

Authors: Zhiyu Chen, Yu Li, Suochao Zhang, Jingbo Zhou, Jiwen Zhou, Chenfu Bao, Dianhai Yu | Published: 2024-03-12
Watermarking
Privacy Protection Method
Framework

Don’t Forget What I did?: Assessing Client Contributions in Federated Learning

Authors: Bishwamittra Ghosh, Debabrota Basu, Fu Huazhu, Wang Yuan, Renuga Kanagavelu, Jiang Jin Peng, Liu Yong, Goh Siow Mong Rick, Wei Qingsong | Published: 2024-03-11
Client Contribution Assessment
Optimization Methods
Federated Learning

ACFIX: Guiding LLMs with Mined Common RBAC Practices for Context-Aware Repair of Access Control Vulnerabilities in Smart Contracts

Authors: Lyuye Zhang, Kaixuan Li, Kairan Sun, Daoyuan Wu, Ye Liu, Haoye Tian, Yang Liu | Published: 2024-03-11 | Updated: 2024-03-18
Smart Contract
Prompt Injection
Automated Vulnerability Remediation

Poisoning Programs by Un-Repairing Code: Security Concerns of AI-generated Code

Authors: Cristina Improta | Published: 2024-03-11
Security Analysis
Backdoor Attack
Poisoning

Provable Mutual Benefits from Federated Learning in Privacy-Sensitive Domains

Authors: Nikita Tsoy, Anna Mihalkova, Teodora Todorova, Nikola Konstantinov | Published: 2024-03-11 | Updated: 2024-11-07
Poisoning
Optimization Problem
Federated Learning

Stealing Part of a Production Language Model

Authors: Nicholas Carlini, Daniel Paleka, Krishnamurthy Dj Dvijotham, Thomas Steinke, Jonathan Hayase, A. Feder Cooper, Katherine Lee, Matthew Jagielski, Milad Nasr, Arthur Conmy, Itay Yona, Eric Wallace, David Rolnick, Florian Tramèr | Published: 2024-03-11 | Updated: 2024-07-09
Prompt leaking
Model Robustness
Model Extraction Attack

DNNShield: Embedding Identifiers for Deep Neural Network Ownership Verification

Authors: Jasper Stang, Torsten Krauß, Alexandra Dmitrienko | Published: 2024-03-11
DNN IP Protection Method
Watermarking
Model Performance Evaluation

Fake or Compromised? Making Sense of Malicious Clients in Federated Learning

Authors: Hamid Mozaffari, Sunav Choudhary, Amir Houmansadr | Published: 2024-03-10
Backdoor Attack
Poisoning
Malicious Client

Cross-ecosystem categorization: A manual-curation protocol for the categorization of Java Maven libraries along Python PyPI Topics

Authors: Ranindya Paramitha, Yuan Feng, Fabio Massacci, Carlos E. Budde | Published: 2024-03-10
Dataset Generation
Library Classification

Fluent: Round-efficient Secure Aggregation for Private Federated Learning

Authors: Xincheng Li, Jianting Ning, Geong Sen Poh, Leo Yu Zhang, Xinchun Yin, Tianwei Zhang | Published: 2024-03-10
Computational Efficiency
Communication Efficiency
Federated Learning